At this year’s South By Southwest (SXSW) conference in Austin, Google created a Google Assistant Fun House to display the many features of its AI assistant platform. Apart from the basic tasks it can perform on a smarthome, Google wanted to flaunt some of its unique uses, including a beer vending system and a sock sorter.

At this year’s South By Southwest (SXSW) conference in Austin, Google created a Google Assistant Fun House to display the many features of its AI assistant platform. Apart from the basic tasks it can perform on a smarthome, Google wanted to flaunt some of its unique uses, including a beer vending system and a sock sorter. But that's not all that's new with Assistant.

Voice-powered motive

You might think that the whole point of this spectacle is to show off their caliber as the world’s premier tech leader, but these geniuses actually have a plan brewing. They upgraded their Google Assistant primarily for developers and device makers who want to integrate voice commands onto their products.

Brad Abrams, group product manager for Google Assistant platform, says their mission with this particular technology is to help people get their tasks done with the help of third-party devices and services. They wanted to start by making the syntax commands easy, so you can say “Hey Google, make me an Espresso.” instead of “Hey Google, ask [coffee machine brand] to make me an Espresso.”

He explains that the digital world is advancing to a realm of ambient computing wherein your commands to Google are picked up by the nearest devices and executed by the most suitable one.

Nagging commands

Google Assistant already has the ability to notify users regarding daily news, traffic, and weather updates. This time around, the tech giant added more subscriptions, including daily fashion advice, horoscopes, factoids, and important events. Hearst Magazine is the first to offer the additional notifications, which they believe has increased user engagement.

Audio choices (besides music)

Google users who wanted to hear more natural sounds, like a crackling fireplace or heavy rain, could previously only listen to audio snippets with playback limits from third-party actions. Now, they can replay, resume, pause, and listen indefinitely. This is particularly beneficial for users who listen to news briefs, enjoy calming sounds, or meditate.

Out of these new upgrades, none will have a huge effect on their own, yet together they could make Google Assistant more responsive to hardware brands and partners.

These fun and unique Google Assistant features reflect the creativity this tech company always brings to the industry. Interested in spicing up your office space, too? Contact us today and we’ll discuss how you can take advantage of this feature-rich, voice-powered tech.

Maximizing your Office 365 investment is easier said than done. Sure, you use Outlook and SharePoint all the time, but there are loads of features you’re probably not using. If you’re looking for ways to make the most out of your Office 365 subscription, you’re in luck because that’s what we’re discussing today.

Maximizing your Office 365 investment is easier said than done. Sure, you use Outlook and SharePoint all the time, but there are loads of features you’re probably not using. If you’re looking for ways to make the most out of your Office 365 subscription, you’re in luck because that’s what we’re discussing today.

SharePoint

SharePoint is the “communication sites” platform for building an intranet where you can upload and manage content. It’s customizable, feature-rich, and ideal for organizations that need an online library of information.

It’s a relatively new feature that allows you to add vibrant templates and visually appealing layouts to your company’s intranet, turning it into a highly dynamic and interactive page that staff will enjoy accessing for company announcements, to share updates, and more.

Teams

Microsoft Teams is an interactive workspace that lets users chat about specific projects. It’s a collaboration tool integrated with Office applications like Word, Excel, and PowerPoint, so it’s an ideal alternative to SharePoint for employees who don’t need the latter’s more robust capabilities.

Yammer

Yammer is an easy-to-use social networking platform for companies where users can post status updates, create polls, and make announcements.

It’s also useful for sharing and co-authoring documents and discussing content from SharePoint and Skype for Business. Much like Facebook, it allows users to join interest groups where they can interact with members similar to how Facebook Groups works.

Planner

Planner is Office 365’s work management application that lets you create, organize, and assign tasks, share files, and chat about ongoing projects. While its functions seem similar to Teams’, Planner’s main purpose is to organize tasks and provide users with a visible and transparent platform for coordinating work. It’s primarily a business tool whereas Teams is more of a communication tool.

PowerApps

PowerApps lets you build custom applications with a minimum amount of coding involved. Although there are similar app-building tools on the market, PowerApps is especially useful for Office 365 users because it seamlessly integrates with O365 apps, including SharePoint, for easy access to your data already stored in the Office environment.

Flow

Flow is an intuitive tool that has built-in templates you can use to automate various tasks. Things like tracking hours worked, saving files from one SharePoint account to another, and creating calendar events are streamlined by Flow. And like all the aforementioned apps, Flow allows you to create workflows using files from OneDrive or SharePoint.

Whether you’re a new or a long-time Office 365 user, these programs and features are hiding in plain sight, and we’re here to help you explore and maximize them for your business. Call us today if you need expert recommendations for office productivity.

The Equifax breach in 2017 exposed the personal information of 145.5 million people in the US and some parts of the UK and Canada, but the number of victims keeps increasing. In the beginning of March, the credit-reporting company revealed that more personal information was leaked.

The Equifax breach in 2017 exposed the personal information of 145.5 million people in the US and some parts of the UK and Canada, but the number of victims keeps increasing. In the beginning of March, the credit-reporting company revealed that more personal information was leaked. Read on to find out more about this latest development.

What happened?
On March 1, Equifax reported that the names and driver’s license numbers of approximately 2.4 million Americans were stolen. According to the company, sensitive information like home addresses, home states, or the license issue and expiration dates were not leaked. Equifax said these breaches were discovered only recently because their forensic investigations primarily focused on stolen Social Security numbers.

In response, the company said that anyone affected would be notified directly. They’re also now offering a security program designed to prevent identity theft and credit tampering. However, given the company’s poor track record, not many are willing to enroll.

When the company first announced the breach in September last year, the tool used to check whether an account had been hacked didn’t work and came up with false positives. Fortunately, there are other things you can do to protect yourself.

Monitor your credit
Consider looking through your credit reports for any suspicious spending. If you spot any new accounts, loans, and other payments you don’t recognize, contact your credit card company to report fraudulent transactions.

Check the dark web
Compromised data is often sold to the highest bidder on the dark web, so most Equifax data can probably be found there. To see whether your personal information has indeed been compromised, sign up for dark web monitoring services. Then consult with a security professional to discuss your options.

Place a credit freeze
One way you can prevent hackers from opening credit cards and making payments in your name is to freeze your credit. When you implement this, anyone masquerading as you will be required to provide a PIN to unfreeze your account. Contact the credit bureaus (Equifax, Experian, TransUnion) to activate this service.

Set fraud alerts
When you set a fraud alert, credit card companies and businesses must verify your identity before opening an account or making any payments. Together with a credit freeze, alerts will make it extremely difficult for hackers to steal your identity.

Learn to identify phishing scams
Because Equifax is notifying data breach victims directly through email, hackers could take this opportunity to send fake messages that direct users to dangerous websites. As such, knowing how to identify phishing scams (suspicious URL links, attachments, and spelling errors) is vital.

Dealing with data breaches is a long and frustrating process, especially for businesses that just want to focus on growing their operations. So if you have any security concerns, call us today. We have the cybersecurity expertise to protect you.

Nearly everyone uses social media. And whether you run a small- or medium-sized business (SMB) or multinational conglomerate, social media platforms are great for their broad audiences, low costs, and high returns. But without careful planning, marketing in these communities can do more harm than good.

Nearly everyone uses social media. And whether you run a small- or medium-sized business (SMB) or multinational conglomerate, social media platforms are great for their broad audiences, low costs, and high returns. But without careful planning, marketing in these communities can do more harm than good. Here are five tips on how to use your social media effectively.

#1. Choose the right platform

Between Facebook, Twitter, Instagram, YouTube, and LinkedIn to choose from, you may be tempted to sign up for more social media accounts than you’re ready to manage. It may not seem like much at first, but you'd be surprised by how quickly you can be overwhelmed by statuses, commenting on existing posts, and answering inquiries on every platform, which is why it’s better to adopt only a few platforms that can effectively attract your target customers.

Ask yourself these questions before deciding which platform to use:

Who is my target customer and what channels do they use?

What do I hope to gain by opening a social media account?

What kind of content do I want to share and create?

How much time can I devote to social media management?

#2. Know when to update

Are most of your customers online at 8am or 8pm? With a better understanding of your target users' habits, you can schedule your posts so they create more traffic, increase brand engagement and, eventually, generate new leads and customers.

Depending on which platform you choose to invest in, you should post a new update during these times for maximum engagement:

#3. Use attractive, professional-looking visuals

One of the simplest ways to get followers to share your posts is by uploading high-quality photos, videos, and reliable infographics along with your messages. Studies have shown that Facebook posts with images result in 39% more engagement while tweets with images or videos create 200% more engagement.

#4. Engage with your followers

It’s important for businesses to maintain a healthy back-and-forth on social media. This means beyond sharing useful content, you should also respond to their comments and private messages as quickly as possible. You can build stronger relationships with customers by writing thank you comments to anyone who shared positive experiences with your business, and by addressing negative comments with personalized and helpful responses.

#5. Pump the brakes on promotional materials

With social media becoming important tools for customers and businesses to connect and interact, it is important not to muddy the water with too many promotional posts. A rule of thumb for social media promotions is that 80% of your posts should be shareable and interactive content, while the remaining 20% should be about your business. This will result in more engagement, a more consistent brand image, and a healthier bottom line.

Social media can help your business succeed, but only if it’s used correctly and effectively. If you’re interested in adopting the right social media platform to increase engagement and create a stronger brand reputation, contact us today and we’ll help you get started.

Google recently launched a new feature on Google Drive that will improve collaboration. Users can now use a combination of Microsoft Office and G Suite while working with their teammates and clients. This update allows them to conveniently comment on Office files, images, and PDFs in the ‘Preview’ pane of Drive.

Google recently launched a new feature on Google Drive that will improve collaboration. Users can now use a combination of Microsoft Office and G Suite while working with their teammates and clients. This update allows them to conveniently comment on Office files, images, and PDFs in the ‘Preview’ pane of Drive. Learn how you can take advantage of this new feature.

To reduce the hassles

Google Drive allows your team to seamlessly share files in the cloud and work on the go. The tech giant knows that businesses require all types of tools and files to finish certain tasks and responsibilities efficiently. This is why they eliminated the stresses of converting a document into a G Suite equivalent file just to allow commenting.

To ease your responsibilities

Google decided to enable comments directly on Microsoft office documents, images, and PDFs without any need for conversion. This is particularly helpful when you’re working with another firm, negotiating a sales transaction with a supplier, or discussing a contract with a customer. In each case, you'd likely deal with different file formats.

To improve collaboration

The most recent update allows you to comment on various file formats in Google Drive, akin to how you do it in Google Docs. In Drive’s ‘Preview’ pane, you can assign tasks, mention colleagues, or add notes, and your team will be able to respond even if they don’t use G Suite.

For instance, when one of your colleagues opens an MS Word document on a Windows computer, he or she will automatically see the comments you added and have the chance to respond to it. Commenting on the ‘Preview’ pane won’t require you to open other applications or browsers just to finish your task. Instead, you can just open documents in its preview form, provide feedback, and get back to work.

Every now and then, Google releases new features on their host of tools and applications -- and it’s always for your benefit. Make sure you take advantage of these upgrades by regularly updating your G Suite. If this sounds too technical for you, or you really don’t have enough time to stay up to date, don’t hesitate to give us a call. It is always our pleasure to help you reach your bottomline in any way that we can.

Very few internet users understand the meaning of the padlock icon in their web browser’s address bar. It represents HTTPS, a security feature that authenticates websites and protects the information users submit to them. Let’s go over some user-friendly HTTPS best practices to help you surf the web safely.

Very few internet users understand the meaning of the padlock icon in their web browser’s address bar. It represents HTTPS, a security feature that authenticates websites and protects the information users submit to them. Let’s go over some user-friendly HTTPS best practices to help you surf the web safely.

HTTPS Encryption

Older web protocols lack data encryption. When you visit a website that doesn’t use HTTPS, everything you type or click on that website is sent across the network in plain text. So, if your bank’s website doesn’t use the latest protocols, your login information can be intercepted by anyone with the right tools.

HTTPS Certificates

The second thing outdated web browsing lacks is publisher certificates. When you enter a web address into your browser, your computer uses an online directory to translate that text into numerical addresses (e.g., www.google.com = 8.8.8.8) then saves that information on your computer so it doesn’t need to check the online directory every time you visit a known website.

The problem is, if your computer is hacked it could be tricked into directing www.google.com to 8.8.8.255, even if that’s a malicious website. Oftentimes, this strategy is implemented to send users to sites that look exactly like what they expected, but are actually false-front sites designed to trick you into providing your credentials.

HTTPS created a new ecosystem of certificates that are issued by the online directories mentioned earlier. These certificates make it impossible for you to be redirected to a false-front website.

What this means for daily browsing

Most people hop from site to site too quickly to check each one for padlocks and certificates. Unfortunately, HTTPS is way too important to ignore. Here are a few things to consider when browsing:

If your browser marks a website as “unsafe” do not click “proceed anyway” unless you are absolutely certain nothing private will be transmitted.

There are web browser extensions that create encrypted connections to unencrypted websites (HTTPS Everywhere is great for Chrome and Firefox).

HTTPS certificates don’t mean anything if you don’t recognize the company’s name. For example, goog1e.com (with the 'l' replaced with a one) could have a certificate, but that doesn’t mean it’s a trustworthy site.

Avoiding sites that don’t use the HTTPS protocol is just one of many things you need to do to stay safe when browsing the internet. When you’re ready for IT support that handles the finer points of cybersecurity like safe web browsing, give our office a call.

]]>Happy 5 Year Anniversary to Adam Weflen! Team NDSE appreciates all of your hard work and dedication the past 5 years. Thank you for being an essential part of our success!http://www.ndse.net/2018/03/happy-5-year-anniversary-to-adam-weflen-team-ndse-appreciates-all-of-your-hard-work-and-dedication-the-past-5-years-thank-you-for-being-an-essential-part-of-our-success/
Wed, 07 Mar 2018 19:21:00 +0000http://www.ndse.net/2018/03/ndse-celebrates-employee-appreciation-day-copy/NDSE Celebrates Employee Appreciation Day!.

Even if you’re aware of virtualized containers, it’s probably difficult to explain how they differ from virtual desktops. Thankfully, all you really need to understand is whether containers are the better option for your business -- and we can answer that in under ten minutes.

Even if you’re aware of virtualized containers, it’s probably difficult to explain how they differ from virtual desktops. Thankfully, all you really need to understand is whether containers are the better option for your business -- and we can answer that in under ten minutes.

What are virtual desktops?

Imagine all you have is a computer monitor, keyboard, and mouse. Virtual desktop technology allows you to connect those devices to a server across either the internet or your office network. Once connected to the server, your monitor will display a fully functional operating system, and your keyboard and mouse will interact with that desktop with zero lag.

The server you connect to could host dozens of virtual desktops that other users access simultaneously, each with their own storage space, files, and applications.

This explanation is a bit of an oversimplification. You still need computer hardware (motherboard, CPU, RAM, etc.) to connect to a virtual desktop server, but the cheapest components available will do the trick. Everything you see on your monitor is really happening on the server, the computer at your desk is just an access point.

What are containers?

Let’s start with an example. Envision a business that provides video production services. All of its employees spend 20% of their time editing videos in one application. That application requires a lot of computing power, but this company can’t afford to buy everyone a high-end computer for a task they spend so little time on. Other production tasks are simple and don’t require expensive hardware, so virtual desktops aren’t necessary.

With containers, employees could connect to the server from their mid-range desktops and use its hardware to run the resource-hogging application. As long as your server is fast enough, employees can connect, run the application, and go back to other programs on their local computer.

Aside from using server resources more efficiently, containers are also exempt from operating system limitations. If a container is stored on a Windows-based server, there’s nothing stopping a Mac computer from working with the application stored inside the container.

Are virtual desktops or containers better for my business?

The biggest factor when choosing between these two technologies is the nature of your work. If employees are regularly switching between half a dozen applications, it’s probably smarter to go with virtual desktops since they are more flexible and open-ended. If most of your challenges are centered around one or two programs, containers are likely the smarter choice.

Every business is different, and we’ll be the first ones to admit there are cases when it makes more sense to invest in high-end employee desktops, or create a virtual desktop for that one obnoxious application. Whatever the right answer is for you, we promise to give it to you straight!

Give us a call today to hear our two cents on how you could be saving money with virtualization.

Outlook is arguably the best tool that businesses use to manage their email, set up meetings, and coordinate projects. It's much more than a basic email program and includes features that help you organize your work, contacts, and business communications.

Outlook is arguably the best tool that businesses use to manage their email, set up meetings, and coordinate projects. It's much more than a basic email program and includes features that help you organize your work, contacts, and business communications. Let's take a look at a few tips you may have missed.

Clean Up Folder & Subfolders - Reviews all messages in a selected folder and its subfolder, and deletes redundant messages in all of them.

Ignore (unnecessary) conversations
An overstuffed inbox is often caused by group conversations that aren't relevant to you. The Ignore button helps you organize your inbox and focus on relevant emails.

Select a message, then click Home > Ignore > Ignore Conversation. You can also do this by opening a message in a new window and clicking Ignore under the Delete function. To recover an ignored message, go to the Deleted Items folder, and click Ignore > Stop Ignoring Conversation.

Send links instead of a file copy
Help your colleagues save storage by sending a link to a cloud version of a file instead of the file itself. This is particularly useful when sending massive files. You can also set permissions to allow recipients to edit and collaborate on linked files in real time.

Upload the file you wish to send on OneDrive and send it to your recipients. From the message box, click Attach File > Browse web locations > OneDrive.

Improve meetings with Skype and OneNote
Outlook allows you to combine Skype's HD video and screen-sharing features with OneNote's organizational and project planning functions. It’s easy:

Go to the Meeting tab in Outlook, then click Skype meeting and send the link to participants. After the meeting has started, select Meeting Notes (under the Meeting tab) and choose whether you want to Take notes on your own or Share notes with the meeting.

Tag contacts
To get the attention of a specific person in a group email message, use the @Mention function. This works particularly well for mails to multiple recipients or for if you simply want to convey the urgency of your message.

In the email body or meeting request, type the ‘@’ symbol followed by the first and last name of the person you wish to tag (e.g., @firstnamelastname).

To search for emails you're tagged in, select Filter Email from the Home tab and choose Mentioned, then choose Mentioned.

These are just a few strategies for getting more out of Microsoft's email platform. To unlock Outlook's true potential, you need the support of certified IT professionals. Give us a call today.